{"id":527640,"date":"2024-09-12T13:38:28","date_gmt":"2024-09-12T17:38:28","guid":{"rendered":"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop"},"modified":"2024-10-08T07:29:20","modified_gmt":"2024-10-08T11:29:20","slug":"cyber-resilience-planning-workshop","status":"publish","type":"page","link":"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop","title":{"rendered":"Cyber Resilience Planning Workshop"},"content":{"rendered":"<div class=\"style-background-image dark-mode wp-block-commvault-v2-hero\">\n\t<div class=\"wp-block-commvault-v2-hero__container\">\n\t\t\t\t\t<div class=\"wp-block-commvault-v2-hero__breadcrumbs\">\n\t\t\t\t<ul class=\"new-breadcrumbs\"><li><a href=\"https:\/\/www.commvault.com\">Home<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li><a href=\"https:\/\/www.commvault.com\/becoming-cyber-ready\">Becoming Cyber Ready<\/a><\/li> <svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M1 2.5L5 6.5L1 10.5M7 2.5L11 6.5L7 10.5\" stroke=\"currentcolor\" stroke-width=\"1.2\"\/><\/svg> <li>Cyber Resilience Planning Workshop<\/li><\/ul>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\n\t\t<h1 class=\"title text-heading-l text-md-heading-l text-lg-heading-xxl text-xl-heading-xxxl\">\n\t\t\tCyber Resilience Planning Workshop\t\t<\/h1>\n\n\t\t<p class=\"subheading text-body-m text-xl-body-l\">\n\t\t\tThis collaborative workshop covers the importance of proactive recovery planning, agility in effective threat response, and how to maintain cyber resilience in the face of current and future threats&nbsp;\t\t<\/p>\n\n\t\t<div class=\"wp-block-commvault-v2-hero__cta-wrapper scalable-cta-button\">\n\t\t\t\n<div class=\"is-style-primary wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/shift-roadshow\"\n\t\t\taria-label=\"Find a city near you\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tFind a city near you\t\t\t\t<\/span>\n\t\t\t\t<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M12.8788 8.00008L7.08586 2.20718L8.50008 0.792969L16.7072 9.00008L8.50008 17.2072L7.08586 15.793L12.8788 10.0001H0.292969V8.00008H12.8788Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t<div class=\"wp-block-commvault-v2-hero__bg\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/19_3d0340.png\" class=\"wp-block-commvault-v2-hero__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/19_3d0340.png 1920w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/19_3d0340.png?resize=800,448 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/19_3d0340.png?resize=768,430 768w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/19_3d0340.png?resize=1280,717 1280w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/19_3d0340.png?resize=1536,861 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t<\/div>\n\t<\/div>\n<div class=\"alignfull sticky wp-block-commvault-v2-page-navigation\">\n\t<div class=\"custom-container\">\n\t\t<div class=\"nav-wrapper\">\n\t\t\t<div class=\"left-nav\">\n\t\t\t\t<div class=\"tab-menu\">\n\t\t\t\t\t<span>Cyber Resilience Planning Workshop<\/span>\n\t\t\t\t\t<button class=\"toggle\">\n\t\t\t\t\t\t<svg width=\"12\" height=\"8\" viewBox=\"0 0 12 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<path d=\"M11 1.5L6 6.5L1 1.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/>\n\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t\t<ul class=\"wp-block-commvault-v2-page-navigation__ul\" aria-label=\"Page navigation\" =\"true\" role=\"navigation\">\n\t\t\t\t\t\t\t\t\t\t<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#The-Workshop-Experience\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>The Workshop Experience<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#Workshop-Features\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Workshop Features<\/span>\n\t<\/a>\n<\/li>\n\n<li class=\"wp-block-commvault-v2-page-navigation-item\">\n\t<a href=\"#FAQ\" target=\"_self\" class=\"navigation-link \">\n\t\t<span>Workshop FAQs<\/span>\n\t<\/a>\n<\/li>\n\n\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"right-nav\">\n\t\t\t\t<a href=\"https:\/\/www.commvault.com\/shift-roadshow\" class=\"nav-cta\" target=\"_blank\">\n\t\t\t\t\t<span>Register for the Workshop Now<\/span>\n\t\t\t\t\t<svg width=\"12\" height=\"13\" viewBox=\"0 0 12 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t<path d=\"M5 1.5L10 6.5M10 6.5L5 11.5M10 6.5H0\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"stats block-aligncenter wp-block-commvault-v3-stats-v3\" id=\"The-Workshop-Experience\">\n\t\t\t<div class=\"grid-container no-gap\">\n\t\t\t<div class=\"innerblocks-wrapper col-12\">\n\t\t\t\t\n<div class=\"aligncenter wp-block-commvault-v3-section-header-v3\">\n\t\n\t\n<div class=\"section__spacing\">\n\t<div class=\"section-header-inner-wrapper\">\n\t\t\n<div class=\"section-header__content text-box-component\">\n      <h5 class=\"eyebrow text-eyebrow-s\">\n      the Workshop Experience&nbsp;    <\/h5>\n        <h2 class=\"section__title text-heading-l text-md-heading-xl text-lg-heading-xxl\">\n      A new kind of learning experience&nbsp;    <\/h2>\n  \n      <p class=\"section__description text-body-s text-md-body-m text-lg-body-l\">\n      Learn how to create a cyber recovery plan so your organization is ready to weather an attack.    <\/p>\n  <\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n\n<div class=\"wp-block-commvault-v3-stats-items\">\n\t<div class=\"stats__container__statistic\">\n\t\t<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Domain-Org-3_Crocus_RGB_67e4a8.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tScenario-based workshop\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tLearn by doing, using knowledge of your organization as your personal case study for this assessment and planning exercise&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Content-Indexing_Crocus_RGB_896808.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tRisk &amp; vulnerability assessment\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tLearn why you must identify vulnerabilities, mission-critical data streams, and infrastructure weaknesses as part of &nbsp;your cyber recovery plan.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n<div class=\"item-feature wp-block-commvault-v2-stats-item\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/Architect_Crocus_RGB_c01c50.svg\" class=\"stats__image\" alt=\"\" \/>\n\t\n\t<div class=\"stats__info w-full\">\n\n\t\t\t\t\t\t<h3 class=\"featureTitle mb-4 text-heading-s text-lg-heading-m\">\n\t\t\t\t\tCyber resilience planning framework\t\t\t\t<\/h3>\n\t\t\t\n\t\t<p class=\"text-body-s text-md-body-m m-0\">\n\t\t\tPrepare to put a plan in place based around key people and processes to maximize your cyber resilience.&nbsp;\t\t<\/p>\n\n\t\t\t<\/div>\n\n<\/div>\n\n\t<\/div>\n<\/div>\n<div class=\"wp-block-commvault-v3-graph\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 graph__container\">\n\t\t\t<div class=\"content\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"section__title text-heading-s text-md-heading-m mt-0 mb-6\">\n\t\t\t\t\t\tFusce eget odio.\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t<div class=\"graph__list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 10%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tA\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t10%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 25%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tB\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t25%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 30%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tC\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t30%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"graph__item\">\n\t\t\t\t\t\t\t\t<div\n\t\t\t\t\t\t\t\t\tstyle=\"width: 50%;\"\n\t\t\t\t\t\t\t\t\tclass=\"graph__item__title \">\n\t\t\t\t\t\t\t\t\tD\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"graph__item__value\">\n\t\t\t\t\t\t\t\t\t50%\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<span class=\"votes text-body-s mt-4 mt-md-12\">2000 Votes<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n<div style=\"background-color: ;\" class=\"alignfull wp-block-commvault-v2-double-side-image\" id=\"Workshop-Features\">\n\t<div class=\"container\">\n\t\t<div class=\"grid-container no-gap\">\n\t\t\t\t\t\t\t\t<div class=\"col-12 col-lg-8 offset-lg-2 text-center heading__double__side__image\">\n\t\t\t\t\t\t<h5 class=\"eyebrow text-eyebrow-s text-md-eyebrow-m\">\n\t\t\t\t\t\tWhat you will learn&nbsp;\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t<h2 class=\"text-heading-l text-md-heading-xl text-lg-heading-xxl section_title\">\n\t\t\t\t\t\t\tHow to make your organization more cyber resilient &nbsp;\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<p class=\"description text-body-m text-lg-body-l\">\n\t\t\t\t\t\tPreparation and planning is key when you want to be cyber resilient. We teach you how to get there. &nbsp;\t\t\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"cards__container\">\n\t\t\t\t\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tThe cyber threat landscape&nbsp;\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tDistinguish cyber recovery from operational recovery and disaster recovery based on the nature of the threat, scope and focus, methods and tools for recovery, and data integrity and vulnerability.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/2_476bb1.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/2_476bb1.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/2_476bb1.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/2_476bb1.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tCyber recovery planning\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tIdentify the requirements for cyber recovery that go beyond what is needed for disaster recovery, including the recommended data protection procedures and mapping of immediate response actions.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/18_c94a81.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/18_c94a81.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/18_c94a81.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/18_c94a81.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tAnomaly and threat detection\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tLearn how anomaly and threat detection provide a layered security approach that offers real-time monitoring and deep analysis for a more robust defense.&nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/7_501c36.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/7_501c36.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/7_501c36.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/7_501c36.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\n\n<div class=\"wp-block-commvault-v2-double-side-image-card\">\n\t<div class=\"grid-container\">\n\t\n<div class=\"double-side-image--right col-12 col-md-5 order1 offset-md-1\">\n\t\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tTabletop and cyber recovery exercises\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tExperience the power of leveraging tabletop discussions on cyber recovery preparedness along with the power of a Commvault&rsquo;s cleanroom for planning, testing, and recovery support. &nbsp;\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n\n<div class=\"double-side-image--left col-12 col-md-5 order2\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"819\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/8_4b3db2.png\" class=\"double-side__image\" alt=\"\" srcset=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/8_4b3db2.png 1088w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/8_4b3db2.png?resize=800,640 800w, https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/8_4b3db2.png?resize=768,614 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div>\n\n\t<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<section style=\"background-color: ;\" class=\"alignfull wp-block-commvault-v3-accordion-v3\" id=\"FAQ\">\n\t<div class=\"container accordion__wrapper\">\n\t\t\t\t\t\n<div class=\"aligncenter wp-block-commvault-v3-section-header-v3\" id=\"FAQ\">\n\t\n\t\n<div class=\"section__spacing\">\n\t<div class=\"section-header-inner-wrapper\">\n\t\t\n<div class=\"section-header__content text-box-component\">\n        <h2 class=\"section__title text-heading-l text-sm-heading-xl text-md-heading-xxl text-lg-heading-xxxl\">\n      FAQs    <\/h2>\n  \n  <\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"c0c3ba93-7158-41cf-8b74-d84595004840\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tWhere can I attend the Cyber Resilience Planning Workshop?\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t<p class=\"\">The Cyber Resilience Workshop will be available as part of the Commvault SHIFT roadshow touring the world starting in October. <br><br>Find a SHIFT roadshow near you. <br><br><a href=\"https:\/\/www.commvault.com\/shift-roadshow\" target=\"_blank\" rel=\"noreferrer noopener\">Register here<\/a>.<\/p>\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"19f4111b-5a70-4433-98e8-ea69458987be\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tWho can participate in the Cyber Resilience Planning Workshop?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t<p class=\"\">The Cyber Resilience Planning Workshop is available to anyone attending the Commvault SHIFT Roadshow events, including customers, non-customers, and partners.&nbsp;<\/p>\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"94a365c4-767d-44d5-b44f-4f160d9f992f\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tWho should join the workshop?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t<p class=\"\">The workshop is intended for security officers, architects, team leads, decision-makers, and anyone interested in making their organization more cyber resilient.&nbsp;<\/p>\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"9698d77d-9cf4-40c2-9b4d-db5f3840053f\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tDo I get a digital badge for completing the workshop?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t<p class=\"\">Yes, like all of our courses and workshops, you get a digital badge as proof of completion. The badge can easily be accessed and shared online as proof of your newly gained knowledge. &nbsp;&nbsp;<\/p>\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\n<section class=\"wp-block-commvault-v3-accordion-item-v3\" id=\"0ea48a4d-1dd6-4454-94cf-0fe10d8b5551\">\n\t<div class=\"accordion-item-block\">\n\t\t<div class=\"title-wrapper\">\n\t\t\t<h4 class=\"accordion-item__title text-body-s font-medium text-md-body-m text-lg-body-l text-xl-body-xl mb-0\">\n\t\t\t\tHow long is the Cyber Resilience Planning Workshop?&nbsp;\t\t\t<\/h4>\n\t\t\t<svg class=\"open-accordion-item\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 12L16 20L8 12\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t\t<svg class=\"close-accordion-item hidden\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\">\n\t\t\t\t<path d=\"M24 20L16 12L8 20\" stroke=\"currentColor\" stroke-width=\"2\"\/>\n\t\t\t<\/svg>\n\t\t<\/div>\n\t\t<div class=\"item-innerblocks hidden\">\n\t\t\t\t\t\t\t<p class=\"\">The Cyber Resilience Planning Workshop takes about two hours to complete.<\/p>\t\t\t\t\t<\/div>\n\t<\/div>\n<\/section>\t\t\t<\/div>\n<\/section>\n\n<div class=\"alignfull wp-block-commvault-v2-newsletter-block\" id=\"Register-Now\">\n\t\t<div class=\"newsletter-container container\">\n\t\t\t\t\t\t\t<div class=\"newsletter-image\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"421\" height=\"525\" src=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/10\/FooterPromoImagesTech-Gal-2.png\" class=\"cmv-component-card__image\" alt=\"\" \/>\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"newsletter__text-wrapper\">\n\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-eyebrow-m text-md-eyebrow-default\">See it in action&nbsp;<\/p>\n\t\t\t\t\t\t\t\t<div class=\"newsletter__text-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"newsletter-block__title text-heading-l text-lg-heading-xxl mb-0\">Ready to get started?&nbsp;<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"newsletter-block__eyebrow text-body-m text-lg-body-l\">Get an in-person look at the latest security solutions from Commvault at a SHIFT cyber resilience roadshow event near you.<\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\t\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"https:\/\/www.commvault.com\/shift-roadshow\"\n\t\t\taria-label=\"Register for the workshop\"\n\t\t\ttarget=\"_blank\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tRegister for the workshop\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":154,"featured_media":0,"parent":527449,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":true,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"Contact Us","subtitle":"","cta_text":"Let us help","cta_link":"\/contact-us","background":{"id":0,"url":""},"light_mode":true},"_cmv_customer_logo":{"id":0,"url":""},"_badge_descriptions":"","_featured_resource":"","_featured_resource_type":"","_custom_title":"","_featured_case_study":"","_footer_case_study":"","_upcoming_webinars_title":"","_upcoming_techdemos_title":"","_template_config":"","_lead_capture_hide_menu":false,"_lead_capture_cta_text":"","_lead_capture_cta_link":"","i18n_hreflangs":"","footnotes":""},"cmv_group":[],"cmv_structure_scheme":[],"class_list":{"0":"post-527640","1":"page","2":"type-page","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Resilience Planning Workshop: Sign Up Now | Commvault<\/title>\n<meta name=\"description\" content=\"Join our Cyber Resilience Training Course to learn how to identify mission-critical assets and plan for cyber recovery following a cyber attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience Planning Workshop\" \/>\n<meta property=\"og:description\" content=\"Join our Cyber Resilience Training Course to learn how to identify mission-critical assets and plan for cyber recovery following a cyber attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T11:29:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Resilience Planning Workshop: Sign Up Now | Commvault","description":"Join our Cyber Resilience Training Course to learn how to identify mission-critical assets and plan for cyber recovery following a cyber attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop","og_locale":"en_US","og_type":"article","og_title":"Cyber Resilience Planning Workshop","og_description":"Join our Cyber Resilience Training Course to learn how to identify mission-critical assets and plan for cyber recovery following a cyber attack.","og_url":"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-10-08T11:29:20+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop","url":"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop","name":"Cyber Resilience Planning Workshop: Sign Up Now | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"datePublished":"2024-09-12T17:38:28+00:00","dateModified":"2024-10-08T11:29:20+00:00","description":"Join our Cyber Resilience Training Course to learn how to identify mission-critical assets and plan for cyber recovery following a cyber attack.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/becoming-cyber-ready\/cyber-resilience-planning-workshop#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Becoming Cyber Ready","item":"https:\/\/www.commvault.com\/becoming-cyber-ready"},{"@type":"ListItem","position":3,"name":"Cyber Resilience Planning Workshop"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/527640","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/154"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=527640"}],"version-history":[{"count":1,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/527640\/revisions"}],"predecessor-version":[{"id":527688,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/527640\/revisions\/527688"}],"up":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/pages\/527449"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=527640"}],"wp:term":[{"taxonomy":"cmv_group","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_group?post=527640"},{"taxonomy":"cmv_structure_scheme","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_structure_scheme?post=527640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}